In the event of a cyberattack a strong incident response plan can get a business running again with minimal damages. Understand the response process in this playbook.
The internet of things (IoT) landscape will be critically affected by the recently discovered Ripple20 vulnerabilities. This group of 19 bugs could potentially hit millions of IoT devices across many different industries.
Through investigation of recent cases, we have amassed more information on how Nefilim ransomware operates. Some notable updates are the use of other tools and the description of events that occur within the attack phases.
PowerShell's ubiquity has made it one of the most common tools cybercriminals abuse to perpetrate attacks and deliver fileless malware to systems. Here's how to track and defend against them.